Amazing work. You instantly gained my respect when you started speaking about RFCs. I remember at one period of my life where I just got my CCNA, I wanted to go all over the topics but in the deepest level possible. So I started reading RFCs of each main protocol, used libraries like scapy to craft packets, and then tested a server's response to the typical behavior described in the RFCs. By the time I finished reading an RFC, I found myself capable of writting simple tools to attack and exploit that behavior. It's so fun to understand how something works, and then using its rules against it. I'm working really hard on my life rn just so I can have enough time on my life to fully dive into these topics again. I will never get enough of this.
Thank you sir! Yes reading the protocol specs/RFC is one of the ways to get deeper understanding on a topic. Might be intimidating at first but will definitely learn lot of things even by just reading a section of it. I like scapy. It really speeds up developing network tooling. I see that it is still the top library for packet manipulation because of 17k+ using it and around 400 contributors. I also have some past videos about network tools. Thanks again for dropping by!
Many individuals may question what the point is of analyzing a vulnerability and writing an exploit for a vulnerability that happened in 2012. The answer to this is simple: If you can develop the thought processes and skills required to exploit vulnerabilities from the past you will be able to apply those skills and thought processes to analyze and understand new vulnerabilities and exploits and even start finding zero days yourself. This is such a valuable exercise and although it takes time and effort, it is in my opinion the best way to skill yourself up. Very few people are willing to walk this path which makes you what I call a Unicorn, but I applaud you for this video once again and hope to see MANY more videos like this.
Thanks for the kinds words dude! Yes I’m always curious how these classic vulnerabilities were discovered and exploited. And yeah this is really a good exercise to improve exploit development and vulnerability research skills. I learned a lot while doing this! I have more videos like this when I’m back from vacation. Thanks again!!
@@hacktheclown this is OT but an older video of yours had some nice electronic music, if you like stuff like it, I could offer you with some mixes of mine, dnb or tech if it's to your liking, just to say thanks
@ Hey bro! Yeah I like those kind of music. Thanks for your offer and yeah I would like to include your music into one of my videos. Feel free to share something to me and I will listen to it.
@@hacktheclown Yay, nice to hear! might come in parts, hearthis is dnb only (from deep to rough sh*t), still have to upload stuff from festivals since 2018 on but already plenty there, I hope some is to your liking :) p1 aHR0cHM6Ly9oZWFydGhpcy5hdC9lZHJ1c2tpbgo=
Hi bro, I don't think there is really a python roadmap for exploit dev. I just learned python from work then I applied it in doing exploits. But there are good books about exploit dev related to python like "Black Hat Python".
Fantastic work, this is possibly the most succinct yet clear explanation without modding any details
You’ll have a million subs by 2026
@@CasualProfundity Thanks bro! 🤡
Amazing work. You instantly gained my respect when you started speaking about RFCs.
I remember at one period of my life where I just got my CCNA, I wanted to go all over the topics but in the deepest level possible. So I started reading RFCs of each main protocol, used libraries like scapy to craft packets, and then tested a server's response to the typical behavior described in the RFCs. By the time I finished reading an RFC, I found myself capable of writting simple tools to attack and exploit that behavior. It's so fun to understand how something works, and then using its rules against it.
I'm working really hard on my life rn just so I can have enough time on my life to fully dive into these topics again. I will never get enough of this.
Thank you sir!
Yes reading the protocol specs/RFC is one of the ways to get deeper understanding on a topic. Might be intimidating at first but will definitely learn lot of things even by just reading a section of it.
I like scapy. It really speeds up developing network tooling. I see that it is still the top library for packet manipulation because of 17k+ using it and around 400 contributors. I also have some past videos about network tools.
Thanks again for dropping by!
that's short for 'Really F*cking Cool stuff' :D
This is my first video on this channel. Subscribed🙌🙌🙌
Awesome! Thank you!
Feel free to browse the past videos. I also create playlist for related videos like exploit development.
Many individuals may question what the point is of analyzing a vulnerability and writing an exploit for a vulnerability that happened in 2012. The answer to this is simple: If you can develop the thought processes and skills required to exploit vulnerabilities from the past you will be able to apply those skills and thought processes to analyze and understand new vulnerabilities and exploits and even start finding zero days yourself. This is such a valuable exercise and although it takes time and effort, it is in my opinion the best way to skill yourself up. Very few people are willing to walk this path which makes you what I call a Unicorn, but I applaud you for this video once again and hope to see MANY more videos like this.
Thanks for the kinds words dude! Yes I’m always curious how these classic vulnerabilities were discovered and exploited. And yeah this is really a good exercise to improve exploit development and vulnerability research skills. I learned a lot while doing this!
I have more videos like this when I’m back from vacation. Thanks again!!
well done bro i enjoyed it keep going🎉
@@mrghost2581 thank you!
Brilliant! Keep posting!
Good content, keep going bro !
@@ayoub_2825 thanks!
Very well done, amazing work, gained a sub
@@0xphk thank you!
@@hacktheclown this is OT but an older video of yours had some nice electronic music, if you like stuff like it, I could offer you with some mixes of mine, dnb or tech if it's to your liking, just to say thanks
@ Hey bro! Yeah I like those kind of music. Thanks for your offer and yeah I would like to include your music into one of my videos. Feel free to share something to me and I will listen to it.
@@hacktheclown Yay, nice to hear! might come in parts, hearthis is dnb only (from deep to rough sh*t), still have to upload stuff from festivals since 2018 on but already plenty there, I hope some is to your liking :)
p1
aHR0cHM6Ly9oZWFydGhpcy5hdC9lZHJ1c2tpbgo=
@ Man those are cool stuffs!
Great video, I did not know so much about this exploit before.
Indeed. This classic attack is really interesting
Awesome video as always man!
Great, keep up
The difference in TLS versions between the record layer and handshake is for backwards compatibility with legacy applications/systems
great video!
Thanks for the info! I realize that as well after recording. Really interesting
As Always, awesome video 🔥
Hella underrated.
Well, thats some COOL 🐛 I have seen in a while...
Goat❤❤
I love your content.
Keep it up!
Thanks for your support!
Very good music and special effects - I subscribe.
Thanks bro!
Keep posting genius 💘
Is it me or is this a vibe on the scene with Zuck programming in the social network?
I haven’t watched that but thanks for dropping by!
Hey you should make a video on your neovim configuration. Many of us would be thankful lol
@@Beyondlimits_400 yes I will create a separate video about my coding setup 🤡
Good stuff. Brilliant work. I just have one question.
Song at 11:15? :)
Thank you! Here is the song:
ua-cam.com/video/FIm7e1Otjys/v-deo.html
thats some sick stuff right here rescpect
Thanks bro!
From where should i learn Python for exploit dev ? like i am bit confuse
can you suggest me a small roadmap somthing
Hi bro, I don't think there is really a python roadmap for exploit dev. I just learned python from work then I applied it in doing exploits. But there are good books about exploit dev related to python like "Black Hat Python".
@ Thanks Bro i am already Reading that Book ! Thanks For the Info !!
what IDE are you using look cool for python coding.
@@cefalohabil hey bro, I’m just using neovim. My terminal is terminator.
New Sub ❤ 2025
Thank you!!
Sir, how to install nvim as an code editor
Easy way is via lazy vim.
www.lazyvim.org/installation
No clowining around in here 🤌🤌🔥